{"id":27322,"date":"2020-06-26T16:07:58","date_gmt":"2020-06-26T10:37:58","guid":{"rendered":"https:\/\/www.flexmind.co\/?p=27322"},"modified":"2020-06-26T16:08:25","modified_gmt":"2020-06-26T10:38:25","slug":"docker-security-quiz-part-i","status":"publish","type":"post","link":"https:\/\/www.flexmind.co\/docker-security-quiz-part-i\/","title":{"rendered":"Docker Security Quiz Part I"},"content":{"rendered":"\n

\n\n
\n\t\n\t
\n\t\t\n\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t<\/div> \n\n<\/div> \n\t\t
\n\t\t\t
\n\t\t\t\t
<\/div>\n\t\t\t<\/div>\n\t\t\t

<\/p>\n

\n
\"Docker<\/figure>\n<\/div>\n

<\/p>\n

<\/p>\n

As the use of container is taking pace in software industry, it is always good to test how much you understand about Docker security in terms of its usage. Like what is role of capabilities, how Apparmor , SELinux works. How Docker architecture poses a security threat etc.<\/p>\n

<\/p>\n

<\/p>\n

This Docker Security quiz would help you to understand very basics working part of Docker where it needs the security. It has 10 questions. You have 10 minutes to complete the quiz and you would need 80% to pass the quiz.<\/p>\n

<\/p>\n

<\/p>\n

Go ahead and enjoy Docker Security quiz Part I . Also, stay tuned for more\u00a0of such quizzes under Container Security quizzes<\/a><\/p>\n

<\/p>\n

<\/p>\n

If you find any issue in the quiz, please mail us at\u00a0learning@flexmind.co<\/a>
You can also comment what you think about this quiz content and its quality.<\/p>\n

<\/p>\n<\/div>

\n\t
\n\t\tTime limit: 0<\/span>\t<\/div>\n\t
<\/div>\n<\/div>\n
\n\t

\n\tQuiz Summary\t<\/h4>\n\t

0<\/span> of 10 Questions completed<\/p>\t

Questions:<\/p>\n\t

<\/div>\n\n\t\n\t <\/div>\n
\n\t

Information<\/h4>\n\t\t <\/div>\n
\n\t\t
\n\t\t\t<\/div>\n<\/div>\n
\t\t\n\t

You have already completed the quiz before. Hence you can not start it again.<\/p><\/div>\n

\n\t

\n\t\tQuiz is loading…\t<\/p>\n<\/div>\n

\n\t

You must sign in or sign up to start the quiz.<\/p><\/div>\n

\n\t

You must first complete the following: <\/span><\/p><\/div>\n

\n\t

Results<\/h4>\n\t

\n\t\t

\n\t\tQuiz complete. Results are being recorded.\t\t<\/div>\n\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t<\/div>\n\t\t\t<\/dd>\n\t\t<\/div>\n\t<\/p>\n<\/div>\n\n
\n\t

Results<\/h4>\n\t

0<\/span> of 10<\/span> Questions answered correctly<\/p>\t\t

\n\t\tYour time: <\/span>\t\t<\/p>\n\t\t\t

\n\tTime has elapsed\t<\/p>\n\n\t\t\t

\n\t\tYou have reached 0<\/span> of 0<\/span> point(s), (0<\/span>)\t\t<\/p>\n\t\t

\n\t\tEarned Point(s): 0<\/span> of 0<\/span>, (0<\/span>)\t\t
\n\t\t0<\/span> Essay(s) Pending (Possible Point(s): 0<\/span>)\t\t
\n\t\t<\/p>\n\t\t\n\t

\n\t\t

\n\t\tCategories\t\t<\/h4>\n\n\t\t
\n\t\t\t
    \n\t\t\t\t\t\t\t
  1. \n\t\t\t\t\tdocker<\/span>\n\t\t\t\t\t0%<\/span>\n\t\t\t\t<\/li>\n\t\t\t\t\t\t\t<\/ol>\n\t\t<\/div>\n\t<\/div>\n\t
    \n\t\t
      \n\t\t\t\t\t\t\t
    • \n\t\t\t\t\t
      \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/li>\n\t\t\t\t\t<\/ul>\n\t<\/div>\n\t\t
      \n\t\t\t\t
      \n\n\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n<\/div>\n
      \n\t
      \n\t
        \n\t\t\t\t\t
      1. 1<\/li>\n\t\t\t\t\t
      2. 2<\/li>\n\t\t\t\t\t
      3. 3<\/li>\n\t\t\t\t\t
      4. 4<\/li>\n\t\t\t\t\t
      5. 5<\/li>\n\t\t\t\t\t
      6. 6<\/li>\n\t\t\t\t\t
      7. 7<\/li>\n\t\t\t\t\t
      8. 8<\/li>\n\t\t\t\t\t
      9. 9<\/li>\n\t\t\t\t\t
      10. 10<\/li>\n\t\t\t<\/ol>\n\t
        <\/div>\n<\/div>\n
        \n\t
          \n\t\t
        1. \n\t\t\t<\/span>\n\t\t\tCurrent<\/span>\n\t\t<\/li>\n\t\t
        2. \n\t\t\t<\/span>\n\t\t\tReview<\/span>\n\t\t<\/li>\n\t\t
        3. \n\t\t\t<\/span>\n\t\t\tAnswered<\/span>\n\t\t<\/li>\n\t\t
        4. \n\t\t\t<\/span>\n\t\t\tCorrect<\/span>\n\t\t<\/li>\n\t\t
        5. \n\t\t\t<\/span>\n\t\t\tIncorrect<\/span>\n\t\t<\/li>\n\t<\/ol>\n\t
          <\/div>\n<\/div>\n
          \n\t<\/div>\n<\/div>\n
          <\/div>\n
          \n\t
            \n\t\t\t\t\t
          1. \n\t\t\t\t
            \n\t\t\t\tQuestion 1<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
            \n\t\t\t\t\t1<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
            \n\t\t\t\t\t
            \n\t\t\t\t\t\t

            Which are the options to do defense-in-depth for Docker security (Multiple choice)<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

            <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

              \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
            • \n\t\t\t\t
              \n\t\t\t\tQuestion 2<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
              \n\t\t\t\t\t2<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
              \n\t\t\t\t\t
              \n\t\t\t\t\t\t

              Which one of these define system of rules which defines what a process is allowed to do and what not?<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

              <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
              • \n\t\t\t\t
                \n\t\t\t\tQuestion 3<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                \n\t\t\t\t\t3<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                \n\t\t\t\t\t
                \n\t\t\t\t\t\t

                Which one of these help in DoS prevention by controlling CPU, memory etc?<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                  \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                • \n\t\t\t\t
                  \n\t\t\t\tQuestion 4<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                  \n\t\t\t\t\t4<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                  \n\t\t\t\t\t
                  \n\t\t\t\t\t\t

                  Which of the following are the part of Docker attack surface (Choose the most appropriate one)<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                  <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                    \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                  • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                  • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                  • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                  • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                  • \n\t\t\t\t
                    \n\t\t\t\tQuestion 5<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                    \n\t\t\t\t\t5<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                    \n\t\t\t\t\t
                    \n\t\t\t\t\t\t

                    Why the Docker REST API is considered a docker attack surface?<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                    <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                      \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                    • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                    • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                    • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                    • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                    • \n\t\t\t\t
                      \n\t\t\t\tQuestion 6<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                      \n\t\t\t\t\t6<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                      \n\t\t\t\t\t
                      \n\t\t\t\t\t\t

                      Choose the best way to mitigate the threat exposed by an attack on docker images.<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                      <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                        \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                      • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                      • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                      • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                      • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                      • \n\t\t\t\t
                        \n\t\t\t\tQuestion 7<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                        \n\t\t\t\t\t7<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                        \n\t\t\t\t\t
                        \n\t\t\t\t\t\t

                        How can an attacker compromise the Docker daemon?<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                        <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                          \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                        • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                        • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                        • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                        • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                        • \n\t\t\t\t
                          \n\t\t\t\tQuestion 8<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                          \n\t\t\t\t\t8<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                          \n\t\t\t\t\t
                          \n\t\t\t\t\t\t

                          Docker run is equivalent to running sudo command<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                          <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                            \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                          • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                          • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                          • \n\t\t\t\t
                            \n\t\t\t\tQuestion 9<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                            \n\t\t\t\t\t9<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                            \n\t\t\t\t\t
                            \n\t\t\t\t\t\t

                            Why you must secure Docker REST API?<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                            <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                              \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                            • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                            • \n\t\t\t\t
                              \n\t\t\t\tQuestion 10<\/span> of 10<\/span>\t\t\t\t<\/div>\n\t\t\t\t
                              \n\t\t\t\t\t10<\/span>. Question\n\t\t\t\t<\/h5>\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t
                              \n\t\t\t\t\t
                              \n\t\t\t\t\t\t

                              Why you should not use docker exec command with privileged or user=root option?<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t

                              <\/p>\n\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t

                                \n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t
                              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t
                              • \n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t